Presentation is loading. Please wait.

Presentation is loading. Please wait.

Authentication Protocol

Similar presentations


Presentation on theme: "Authentication Protocol"— Presentation transcript:

1 Authentication Protocol
Kerberos Authentication Protocol

2 Kerberos Kerberos is a computer network authentication protocol, which allows nodes communicating over a non-secure network to prove their identity to one another in a secure manner Kerberos is perhaps the most-widely used authentication protocol on Earth. (SearchSecurity.com)

3 How it started To talk about Kerberos history is to talk about the project Athena. The project Athena was a join project between the Massachusetts Institute of Technology (MIT), IBM, and Digital Equipment Corporation

4 Athena Objectives Main objectives of Athena was
produce a campus-wide distributed computing environment. it was to integrate a SSO (Single Sign-on) networked file systems a unified graphical environment a naming convention service

5 Kerberos in Athena Kerberos was developed to answer many of the authentication and single sing –on questions. Kerberos was to going to be the authentication protocol for the distributed system that project Athena was developing. In 1987 MIT released Kerberos version 4 software as open source.

6 How Kerberos Works 2 1 Kerbers TGS 3 4 User Server Client 5
Ticket Granting Service User Client Server 5

7 Releases Kerberos version 1 to 3 had been released within MIT.
Steve Miller and Clifford Neuman were the primary designers of Kerberos v4 targeted it primarily for Project Athena Kerberos version 5, designed by John Kohl and Clifford Neuman, was released in 1993 Last version of Kerberos is released on December 2010

8 Kerberos v5 Designed to overcome the limitations and security problems of version 4. Main features: The network protocol has been completely redone and now uses ASN.1 (Abstract Syntax Notation ) Support for forwardable, renewable, and postdatable tickets was added Tickets can now contain multiple IP addresses and addresses for different types of networking protocols A generic crypto interface module is now used so it allows the ability to replace DES with a more cryptographic algorithm

9 Who Uses Kerberos

10 Continue.. X-Box uses Kerberos.
The cable TV industry uses Kerberos to authenticate set-top boxes and modems to their networks. Windows incorporated Kerberos as its default authentication protocol since Windows 2000 Active Directory implementations Apple implemented Kerberos from Mac OS X 10.2 and later Red Hat, Sun, Unix, various versions of Linux

11 Where is Headed In 2007, MIT formed the Kerberos Consortium to foster continued development Founding sponsors include vendors such as Oracle, Apple Inc., Google, Microsoft Centrify Corporation. Academic institutions such as KTH-Royal Institute of Technology, Stanford University, and MIT increase the environments in which it is useful expand Kerberos to work better with related authentication and authorization technologies.

12 What is Next Become the standard.
Kerberos wants to be available on more devices Expand to work with Databases Support mobile devices Interoperability with SAM (Security Assertion Markup Language) Wants to able to work seamlessly between different technologies across different networks. Become the standard.

13 Questions


Download ppt "Authentication Protocol"

Similar presentations


Ads by Google